The Economist

When: Jun 24 2010 8:00 am

Presenting: Vicki Gavin, Head of Business Continuity, The Economist Group

Program TBC


When: Jun 24 2010 6:00 am

Presenting: Jorge Sebastiao, BD Manager Managed Service, ICT & InfoSec Guru

With over 25 years of "Information and Communication Technology"-ICT experience, covering, managed services, outsourcing, security, business continuity, disaster recovery, vendor management, networking, infrastructure management, virtualization financial sector and telecom.


When: Jun 11 2010 10:00 am

Presenting: Martin Palmgren, IT Strategy & Transformation Executive of .COMMUNICATE.

Martin Palmgren is a senior consultant of Swedish origins and the IT Strategy & Transformation Executive of .COMMUNICATE. Engage live with Martin as he presents "Run IT as a Service Business".

When: Jun 10 2010 4:00 pm

Presenting: Ian Clayton, Principal, Service Management

Join Ian Clayton as he deciphers the myths and uncovers the truths of Service Portfolio Management


When: Jun 10 2010 12:00 pm

Presenting: Dhiraj Gupta, Professional in Service Management

In this presentation, Dhiraj presents a thorough analysis of current patterns and emerging trends in ITSM Implementations. Specifically, Dhiraj discusses the reasons ITSM implementations are initiated, where ITSM lives within the IT organizations, the structure of the team delivering the project and various models for implementation.


When: Jun 10 2010 9:00 am

Presenting: Linh Ho, Director of Product Marketing, OpTier

With many traditional monitoring and management tool solutions on the market today, IT professionals are left holding the bag on how to piece together the solutions to deliver the data they need. And now new technologies are changing the way you manage IT and what you should expect from IT management solutions.


When: Jun 10 2010 4:00 am

Presenting: Howard Kendall, SDI Europe; Don Page, Marval Group, Louise McDonald, Swinton Group

Getting the right people, creating the culture where you are keeping them motivated, business relevant, informed, continually improving and cost effective, is only truly viable with the development of service based skills and understanding across IT Services.


When: Jun 24 2010 2:00 pm

Presenting: David Hutcheson, Managing Director, Glen Abbot Ltd

This presentation will give clear and practical advice on how to run an incident, what to make sure your Incident Management plan covers and how to pick your team.


Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.

lumension 6 keys

Recorded: 7 April 2010

Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension

Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.


When: Jun 04 2010 8:00 am

Presenting: Sebastien Giora, French Chapter Leader, OWASP

The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.

SCIPP International

When: Jun 03 2010 2:00 pm

Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP

From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.


When: Jun 03 2010 12:00 pm

Presenting: Michael Coates; Mozilla, Web Security Engineer

Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.


When: Jun 03 2010 4:00 am

Presenting: Justin Clarke, UK Chapter Leader, OWASP

One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.

Wiley Rein

When: May 27 2010 4:00 pm

Presenting: Doug Smith; Wiley Rein, Records Manager

The risks associated with spoliation of evidence are causing organizations everywhere to examine their procedures for evidence preservation. This seminar will offer step by step guidance for instituting and maintaining effective legal holds.

Carnegie Mellon University

When: May 27 2010 2:00 pm

Presenting: David Stevens; Carnegie Mellon University

Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe.


When: May 27 2010 1:00 pm

Presenting: Rick Dales; Proofpoint, VP Product Management, Archiving

Without the right tools in place, collecting, processing, and reviewing electronic data for eDiscovery can be time-consuming, expensive, and expose a business to significant legal risks.

The 451 Group

When: May 27 2010 12:00 pm

Presenting: Nick Patience; The 451 Group, Research Director

E-Discovery and E-Disclosure: The view from the front lines 


When: May 27 2010 6:00 am

Presenting: Clive Freedman, 3VB

Planning the disclosure exercise in litigation Litigation hold discussions with the other party using a questionnaire to identify categories and locations of documents (Goodale v Ministry of Justice)


When: May 06 2010 1:00 pm

Presenting: Robert Whiteley, Research Director, Forrester; Chris Witeck, Director of Product Management, SonicWall

Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester's extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers - the "mobile wannabe" - who, together, are making up a larger and larger portion of your workforce.

When: Apr 29 2010 12:00 pm

Presenting: Ken Liao; Proofpoint, Encryption Specialist

Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners.


When: May 25 2010 6:00 am

Presenting: Frank Rejwan, Group Chief Operating Officer

Join Frank Rejwan who will his discussing the successful adoption of cloud computing.


When: May 25 2010 8:00am

Presenting: Peter Judge, Editor, eWeek Europe

Join Peter Judge, UK Editor of eWeek Euorpe, hosting a roundtable session to discuss how we can understand the factors behind cloud adoption.


When: May 25 2010 12:00 pm

Presenting: Lynda Stadtmueller, Senior Research Analyst, Stratecast

Private or public? On-prem or hosted? Dedicated or shared? For most businesses, the decision isn't whether to embrace cloud computing, but how to choose the best data center environment for each application.






Log in

Please Login to download this file

Username *
Password *
Remember Me







Go to top